Winter Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: myex65

Home > Fortinet > NSE 5 Network Security Analyst > NSE5_FCT-7.0

NSE5_FCT-7.0 NSE5_FCT-7.0 NSE 5 - FortiClient EMS 7.0 Question and Answers

Question # 4

Refer to the exhibit.

Based on the Security Fabric automation settings, what action will be taken on compromised endpoints?

A.

Endpoints will be quarantined through EMS

B.

Endpoints will be banned on FortiGate

C.

An email notification will be sent for compromised endpoints

D.

Endpoints will be quarantined through FortiSwitch

Full Access
Question # 5

When site categories are disabled in FortiClient webfilter and antivirus (malicious websites), which feature can be used to protect the endpoint from malicious web access?

A.

Real-time protection list

B.

Block malicious websites on antivirus

C.

FortiSandbox URL list

Full Access
Question # 6

An administrator needs to connect FortiClient EMS as a fabric connector to FortiGate. What is the prerequisite to get FortiClient EMS to connect to FortiGate successfully?

A.

Revoke and update the FortiClient EMS root CA.

B.

Revoke and update the FortiClient client certificate on EMS.

C.

Import and verify the FortiClient client certificate on FortiGate.

D.

D. Import and verify the FortiClient EMS root CA certificate on FortiGate

Full Access
Question # 7

Refer to the exhibit.

Based on the CLI output from FortiGate. which statement is true?

A.

FortiGate is configured to pull user groups from FortiClient EMS

B.

FortiGate is configured with local user group

C.

FortiGate is configured to pull user groups from FortiAuthenticator

D.

FortiGate is configured to pull user groups from AD Server.

Full Access
Question # 8

Which statement about FortiClient comprehensive endpoint protection is true?

A.

It helps to safeguard systems from email spam

B.

It helps to safeguard systems from data loss.

C.

It helps to safeguard systems from DDoS.

D.

lt helps to safeguard systems from advanced security threats, such as malware.

Full Access
Question # 9

Refer to the exhibit.

An administrator has restored the modified XML configuration file to FortiClient and sees the error shown in the exhibit.

Based on the XML settings shown in the exhibit, what must the administrator do to resolve the issue with the XML configuration file?

A.

The administrator must resolve the XML syntax error.

B.

The administrator must use a password to decrypt the file

C.

The administrator must change the file size

D.

The administrator must save the file as FortiClient-config conf.

Full Access
Question # 10

What does FortiClient do as a fabric agent? (Choose two.)

A.

Provides IOC verdicts

B.

C. Automates Responses

C.

Creates dynamic policies

Full Access
Question # 11

An administrator is required to maintain a software inventory on the endpoints. without showing the feature on the FortiClient dashboard What must the administrator do to achieve this requirement?

A.

The administrator must use default endpoint profile

B.

The administrator must not select the vulnerability scan feature in the deployment package.

C.

The administrator must select the vulnerability scan feature in the deployment package, but disable the feature on the endpoint profile

D.

The administrator must click the hide icon on the vulnerability scan tab

Full Access
Question # 12

An administrator is required to maintain a software vulnerability on the endpoints, without showing the feature on the FortiClient dashboard. What must the administrator do to achieve this requirement?

A.

Disable select the vulnerability scan feature in the deployment package

B.

Use the default endpoint profile

C.

Select the vulnerability scan feature in the deployment package, but disable the feature on the endpoint profile

D.

D. Click the hide icon on the vulnerability scan tab

Full Access
Question # 13

Which two statements are true about ZTNA? (Choose two.)

A.

ZTNA provides role-based access

B.

ZTNA manages access for remote users only

C.

ZTNA manages access through the client only

D.

ZTNA provides a security posture check

Full Access
Question # 14

Refer to the exhibits.

Which show the Zero Trust Tag Monitor and the FortiClient GUI status.

Remote-Client is tagged as Remote-Users on the FortiClient EMS Zero Trust Tag Monitor.

What must an administrator do to show the tag on the FortiClient GUI?

A.

Update tagging rule logic to enable tag visibility

B.

B. Change the FortiClient system settings to enable tag visibility

C.

Change the endpoint control setting to enable tag visibility

D.

Change the user identity settings to enable tag visibility

Full Access